Podcasts by DEF CON 23 [Audio] Speeches from the Hacker Convention
The DEF CON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. Video, audio and supporting materials from past conferences are available on our new media server at: https://media.defcon.org
Further podcasts by DEF CON
Podcast on the topic Technologie
All episodes
Rob Bathurst (evilrob)&Jeff Thomas (xaphan) - Canary: Keeping Your Dick Pics Safe(r) from 2015-11-02T19:48:29
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Evilrob-Xaphan-TLS-Canary-Keeping-Your-Dick-Pics-Safer.pdf
Canary: Keeping Your...
ListenZoz - And That's How I Lost My Other Eye: Further Explorations In Data Destruction from 2015-10-30T15:58:56
And That's How I Lost My Other Eye: Further Explorations In Data Destruction
Zoz Robotics Engineer and Security Researcher
How much more paranoid are you now than you were four years...
Zack Fasel - Seeing through the Fog from 2015-10-30T15:58:34
Seeing through the Fog
Zack Fasel Urbane Security
Yes. "The Cloud" (drink). Even though many of us would much like to see use of public clouds decline, they're not going away any t...
ListenTerrell McSweeny&Ashkan Soltani - How to Hack Government: Technologists as Policy Makers from 2015-10-30T15:58:10
How to Hack Government: Technologists as Policy Makers
Terrell McSweeny Commissioner, Federal Trade Commission
Ashkan Soltani Chief Technologist, Federal Trade Commission
As ...
ListenSean Pierce - Abusing native Shims for Post Exploitation from 2015-10-30T15:57:53
Abusing native Shims for Post Exploitation
Sean Pierce Technical Intelligence Analyst for iSIGHT Partners
Shims offer a powerful rootkit-like framework that is natively implemented i...
Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots from 2015-10-30T15:57:40
Medical Devices: Pwnage and Honeypots
Scott Erven Associate Director, Protiviti
Mark Collao Security Consultant, Protiviti
We know medical devices are exposed to the Internet b...
Runa A. Sandvik&Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle from 2015-10-30T15:57:24
When IoT attacks: hacking a Linux-powered rifle
Runa A. Sandvik
Michael Auger
TrackingPoint is an Austin startup known for making precision-guided firearms. These firearms ship...
Robert Graham and David Maynor - HamSammich – long distance proxying over radio from 2015-10-30T15:57:12
HamSammich – long distance proxying over radio
Robert Graham Erratasec.com
David Maynor Erratasec.com
The ProxyHam talk was mysteriously canceled. However, it’s easy to replica...
Richard Thieme - Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0 from 2015-10-30T15:57
Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0
Richard Thieme Author and Professional Speaker, ThiemeWorks
This presentation is beyond fict...
ListenPeter Shipley - Insteon - False Security and Deceptive Documentation from 2015-10-30T15:56:45
Insteon' False Security And Deceptive Documentation
Peter Shipley Security Researcher
Ryan Gooler
Insteon is a leading home automation solution for controlling lights, locks,...
ListenPanel - ThunderStrike 2- Sith Strike from 2015-10-30T15:56:26
ThunderStrike 2: Sith Strike
Trammel Hudson Vice President, Two Sigma Investments
Xeno Kovah Co-founder, LegbaCore, LLC
Corey Kallenberg Co-Founder, LegbaCore, LLC
The ...
ListenPanel - Licensed to Pwn - Weaponization and Regulation of Security Research from 2015-10-30T15:56:14
Licensed to Pwn: The Weaponization and Regulation of Security Research
Jim Denaro
Dave Aitel
Matt Blaze
Nate Cardozo
Mara Tam
Catherine “Randy” Wheeler
Panel - Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web from 2015-10-30T15:56:02
Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web
Peter Eckersley Electronic Frontier Foundation
James Kasten Electronic Frontier Foundation
Yan Zhu Electroni...
Panel - Contests Closing Ceremonies from 2015-10-30T15:55:48
:
Presenting the results and awards for the DEF CON 23 Contests and Events.
Matt Cagle&Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy War from 2015-10-30T15:55:20
Who Will Rule the Sky? The Coming Drone Policy Wars
Matt Cagle Technology and Civil Liberties Policy Attorney, ACLU of Northern California
Eric Cheng General Manager, DJI SF and Dire...
Marc Rogers&Kevin Mahaffey - How to Hack a Tesla Model S from 2015-10-30T15:55:03
How to Hack a Tesla Model S
Marc Rogers Principle Security Researcher for CloudFlare
Kevin Mahaffey CTO of Lookout Inc
The Tesla Model S is the most connected car in the worl...
ListenGeoff Walton&Dave Kennedy - Pivoting Without Rights – Introducing Pivoter from 2015-10-30T15:54:18
Pivoting Without Rights – Introducing Pivoter
Geoff Walton Senior Security Consultant for Cleveland-based TrustedSec
Dave Kennedy (ReL1K/HackingDave), founder of TrustedSec and Binar...
Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID from 2015-10-30T15:54:01
RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID
Francis Brown Partner - Bishop Fox
Shubham Shah Security Analyst at Bishop Fox
Have you ever attended an RFID hacki...
ListenDamon Small - Beyond the Scan: The Value Proposition of Vulnerability Assessment - 101 Track from 2015-10-30T01:10:17
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Damon-Small-Beyond-the-Scan.pdf
Beyond the Scan: The Value Proposition of Vulne...
ListenDaKahuna&satanklawz - Introduction to SDR and the Wireless Village - 101 Track from 2015-10-30T01:07:42
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-DaKahuna-Satanlawz-Introduction-to-SDR-and-Wifi-Village.pdf
Introduction to SDR...
ListenTottenkoph&IrishMASMS - Hackers Hiring Hackers - How to Do Things Better - 101 Track from 2015-10-30T01:07:30
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Tottenkoph-IrishMASMS-Hackers-Hiring-Hacker.pdf
Hackers Hiring Hackers - How to...
Listen1057 - Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey - RICKASTLEY from 2015-10-30T01:05:28
Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey
LosT
We're no strangers to love
You know the rules and so do I
A full commitm...
Dr. Phil Polstra - Hacker in the Wires - 101 Track from 2015-10-23T03:04:49
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phil-Polstra-Hacker-in-the-Wires.pdf
Extras here:
https://media.defcon.o...
Marina Krotofil&Jason Larsen - Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion from 2015-10-23T01:56:45
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Marina-Krotofil-Jason-Larsen-Rocking-the-Pocketbook-Hacking-Chemical-Plants-UPDATED.pdf ...
ListenJohn Seymour - "Quantum" Classification of Malware from 2015-10-23T01:34:38
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-John-Seymour-Quantum-Classification-of-Malware-UPDATED.pdf
Whitepaper here: htt...
ListenTopher Timzen&Ryan Allen - Hijacking Arbitrary .NET Application Control Flow - 101 Track from 2015-10-23T00:50:21
Materials Available Here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Topher-Timzen-Ryan-Allen-Hijacking-Arbitrary-NET-Application-Control-Flow-UPDATED.pdf Listen
Charlie Miller - Remote exploitation of an unaltered passenger vehicle from 2015-10-21T22:43:08
Remote Exploitation of an Unaltered Passenger Vehicle
Charlie Miller Security engineer at Twitter
Chris Valasek Director of Vehicle Security Research at IOActive
Although the...
ListenAmmonRa - How to hack your way out of home detention from 2015-10-21T22:30:17
Materials Available Here; https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-ammonRA-How-to-hack-your-way-out-of-home-detention-UPDATED.pdf
How to hack your...
ListenAaron Grattafiori - Linux Containers: Future or Fantasy? - 101 Track from 2015-10-21T21:09:41
Materials Available Here:
https://media.defcon.org/DEF CON 23/DEF CON 23 presentations/DEFCON-23-Aaron-Grattafiori-Linux-Containers-Future-or-Fantasy-UPDATED.pdf
Linux Containers:...
ListenPatrick "Unregistered436" McNeil&"Snide" Owen - Sorry, Wrong Number: Mysteries Of The Phone System - Past and Present - 101 Track from 2015-10-21T20:20:37
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Patrick-McNeil-Owen-Sorry-Wrong-Number.pdf
https://media.defcon.org/DEF%20CON%2...
ListenMiaubiz - Put on your tinfo_t hat if youre my type from 2015-10-21T20:20
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Miaubiz-Put-on-Your-Tinfo_t-Hat.pdf
Put on your tinfo_t hat if you're my type <...
ListenNir Valtman&Moshe Ferber - From 0 To Secure In 1 Minute — Securing IAAS from 2015-10-21T19:59:33
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Nir-Valtman-Moshe-Ferber-From-zero-to-secure-in-1-minute-UPDATED.pdf
From 0 To S...
ListenVivek Ramachandran - Chigula — A framework for Wi-Fi Intrusion Detection and Forensics from 2015-10-21T19:58:21
Chigula — a framework for Wi-Fi Intrusion Detection and Forensics
Vivek Ramachandran, Founder, SecurityTube.net and Pentester Academy
Most of Wi-Fi Intrusion Detection & Forensics ...
ListenAditya K Sood - Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities from 2015-10-21T19:56:56
Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities
Aditya K Sood Architect - Threat Research Labs, Elastica inc.
Human Machine Interfaces ...
ListenJose Selvi - Breaking SSL Using Time Synchronisation Attacks from 2015-10-21T19:56:06
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Jose-Selvi-Breaking-SSL-Using-Time-Synchronisation-Attacks.pdf
Breaking SSL Usi...
ListenBart Kulach (Bartlomiej Jakub Kulach - Hack the Legacy! IBM i (aka AS/400) Revealed from 2015-10-21T19:55:10
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Bart-Kulach-Hack-the-Legacy-IBMi-revealed.pdf
Hack the Legacy! IBM i (aka AS/400...
ListenRyan Mitchell - Separating Bots from the Humans from 2015-10-21T19:54:07
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ryan-Mitchell-Separating-Bots-from-Humans.pdf
Separating Bots from the Humans <...
ListenMarte L0ge - Tell me who you are and I will tell you your lock patter from 2015-10-21T19:53:15
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Marte-L0ge-I-will-Tell-you-your-Lock-Pattern-UPDATED.pdf
Tell me who you are an...
ListenJean-Philippe Aumasson - Quantum Computers vs. Computers Security from 2015-10-21T19:52:13
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phillip-Aumasson-Quantum-Computers-vs-Computers-Security.pdf
Quantum Computers ...
ListenAndres Blanco&Andres Gazzoli - 80211 Massive Monitoring from 2015-10-21T18:40:34
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Andres-Blanco-802.11-Massive-Monitoring-UPDATED.pdf
802.11 Massive Monitoring <...
ListenPanel - DEF CON Comedy Inception: How many levels deep can we go? from 2015-10-21T18:37:44
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Panel-Comedy-Inception-Amanda-Berlin-Blue-Team-Hell.pdf
DEF CON Comedy Inceptio...
ListenPatrick Wardle - Stick That In Your root Pipe and Smoke It from 2015-10-21T18:37:01
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Patrick-Wardle-Stick-that-in-your-(Root)Pipe-and-Smoke-it-UPDATED.pdf
Stick Tha...
ListenRyan O'Neill - Advances in Linux Process Forensics Using ECFS from 2015-10-21T18:36:02
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ryan-O%27Neil-Advances-in-Linux-Forensics-ECFS.pdf
Advances in Linux Process Fo...
ListenTeddy Reed&Nick Anderson - Hardware and Trust Security: Explain it like I’m 5 from 2015-10-21T18:35:32
Hardware and Trust Security: Explain it like I’m 5
Teddy Reed Security Engineer Facebook
Nick Anderson Research Scientist
There are a lot of presentations and suggestions tha...
ListenDaniel “unicornFurnace” Crowley&Damon Smith - Bugged Files: Is Your Document Telling on You? from 2015-10-21T18:34:41
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Daniel-Crowley-Damon-Smith-Bugged-Files.pdf
Bugged Files: Is Your Document Tell...
ListenWeston Hecker - Goodbye Memory Scraping Malware: Hold Out Till "Chip And Pin” from 2015-10-21T18:34:15
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Weston-Hecker-Goodbye-Memory-Scraping-Malware.pdf
Goodbye Memory Scraping Malwa...
ListenKen Westin - Confessions of a Professional Cyber Stalker from 2015-10-21T18:33:50
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ken-Westin-Confessions-of-a-Cyberstalker.pdf
Confessions of a Professional Cybe...
ListenColin O'Flynn - Don't Whisper my Chips: Sidechannel and Glitching for Fun and Profit from 2015-10-21T18:33:26
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Colin-O%27Flynn-Dont-Whisper-My-Chips.pdf
Don't Whisper my Chips: Sidechannel a...
ListenJoshua Smith - High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC from 2015-10-21T18:32:49
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Joshua-Smith-High-Def-Fuzzing-Exploitation-Over-HDMI-CEC-UPDATED.pdf
High-Def F...
ListenPanel - WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis from 2015-10-21T18:32:28
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ballenthin-Graeber-Teodorescu-WMI-Attacks-Defense-Forensics.pdf
WhyMI so Sexy? ...
ListenWesley McGrew - I Hunt Penetration Testers: More Weaknesses in Tools and Procedures from 2015-10-21T18:31:56
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Wesley-McGrew-I-Hunt-Penetration-Testers.pdf
I Hunt Penetration Testers: More W...
ListenPatrick Wardle - 'DLL Hijacking' on OS X? #@%&Yeah! from 2015-10-21T18:31:29
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Patrick-Wardle-DLL-Hijacking-on-OSX-UPDATED.pdf
'DLL Hijacking' on OS X? #@%& Y...
ListenChristian (@xntrik) Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF from 2015-10-21T18:30:40
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-xntrik-Hooked-Browser-Meshed-Networks-with-webRTC-and-BeEF.pdf
Hooked Browser M...
ListenIonut Popescu - NetRipper - Smart traffic sniffing for penetration testers from 2015-10-21T18:30:19
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ionut-Popescu-NetRipper.pdf
Whitepaper Here: DEFCON-23-Ionut-Popescu-NetRipper-W...
ListenDavid An - When the Secretary of State says Please Stop Hacking Us from 2015-10-21T18:29:25
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-David-An-When-the-Secretary-of-State-says-Stop-Hacking-us.pdf
When the Secretar...
ListenRyan Castellucci - Cracking Cryptocurrency Brainwallets from 2015-10-21T18:28:27
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ryan-Castellucci-Cracking-Cryptocurrency-Brainwallets.pdf
Cracking Cryptocurren...
ListenIan Latter - Remote Access - the APT from 2015-10-21T18:28:05
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ian-Latter-Remote-Access-the-APT.pdf
Remote Access, the APT
Ian Latter Mi...
Cory Doctorow - Fighting Back in the War on General Purpose Computers from 2015-10-21T16:51:18
Fighting Back in the War on General Purpose Computers
Cory Doctorow Author & Activist, Electronic Frontier Foundation
EFF's Apollo 1201 project is a 10-year mission to abolish all ...
ListenSean Metcalf - Red vs. Blue: Modern Active Directory Attacks&Defense from 2015-10-21T16:23:23
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Sean-Metcalf-Red-vs-Blue-AD-Attack-and-Defense.pdf
Red vs. Blue: Modern Active ...
ListenJeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications from 2015-10-21T16:20:36
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Jeremy-Dorrough-USB-Attack-to-Decrypt-Wi-Fi-Communications.pdf
USB Attack to De...
ListenDEF CON 23 - Closing Ceremonies from 2015-10-21T15:29:02
The Dark Tangent and others give thanks and hand out awards during the DEF CON 23 Closing Ceremonies.
ListenRicky "HeadlessZeke" Lawshae - Let's Talk About SOAP, Baby. Let's Talk About UPNP from 2015-10-21T15:27:24
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Rickey-Lawshae-Lets-Talk-About-SOAP.pdf
Extras here:https://media.defcon.org/DEF...
ListenOmer Coskun - Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts from 2015-10-21T15:25:35
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Omer-Coskun-Why-Nation-State-Malwares-Target-Telco-Networks-UPDATED.pdf
Why nat...
ListenDavid Mortman - Docker, Docker, Give Me The News, I Got A Bad Case Of Securing You from 2015-10-21T15:20:04
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-David-Mortman-Docker-UPDATED.pdf
Docker, Docker, Give Me The News, I Got A Bad ...
ListenPanel - Ask the EFF - The Year in Digital Civil Liberties from 2015-10-21T15:18:07
Ask the EFF: The Year in Digital Civil Liberties
Kurt Opsahl General Counsel, Electronic Frontier Foundation
Nate Cardozo EFF Staff Attorney
Mark Jaycox EFF Legislative Analyst...
Philip Young&Chad "Bigendian Smalls” Rikansrud - Security Necromancy: Further Adventures in Mainframe Hacking from 2015-10-21T15:12:54
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phil-Young-Chad-Rikansrud-Security-Necromancy-Further-Adventures-in-Mainframe-Hacking.pd...
ListenPhilip Young & Chad "Bigendian Smalls” Rikansrud - Security Necromancy: Further Adventures in Mainframe Hacking from 2015-10-21T15:12:54
Materials Here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phil-Young-Chad-Rikansrud-Security-Necromancy-Further-Adventures-in-Mainframe-Hacking.pdf ...
ListenDan Kaminsky - I want these * bugs off my * Internet from 2015-10-21T15:00:23
I want these * bugs off my * Internet
Dan Kaminsky Chief Scientist, White Ops
Are you interested in the gory details in fixing ugly bugs? No? Just like watching stuff blow up? Go t...
ListenMike Ryan&Richo Healey - Hacking Electric Skateboards: Vehicle Research For Mortals from 2015-10-21T14:59:23
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Richo-Healey-Mike-Ryan-Hacking-Electric-Skateboards.pdf
Hacking Electric Skateb...
ListenYan Shoshitaishvili&Fish Wang - Angry Hacking - the next generation of binary analysis from 2015-10-21T14:52:48
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Yan-Shoshitaishvili-Fish-Wang-Angry-Hacking.pdf
Angry Hacking - the next genera...
ListenPanel - F*ck the attribution, show us your .idb! from 2015-10-21T14:24:38
F*ck the attribution, show us your .idb!
Morgan Marquis-Boire Senior Researcher, Citizen Lab
Marion Marschalek Malware reverse engineer, Cyphort Inc
Claudio Guarnieri Creator a...
Michael Walker&Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF from 2015-10-21T13:57:10
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Walker-Wiens-Machine-vs-Machine-DARPA-Fully-Automated-CTF.pdf
Machine vs. Machi...
ListenDaniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns from 2015-10-21T13:53:50
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Daniel-Selifonov-Drinking-from-LETHE.pdf
Drinking from LETHE: New methods of ex...
ListenChris Rock - I Will Kill You from 2015-10-16T13:46:53
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Chris-Rock-I-Will-Kill-You-How-to-Get-Away-with-Murder.pdf
I Will Kill You
Listen
Rich Kelley - Harness - Powershell Weaponization Made Easy from 2015-10-16T13:44:41
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Rich-Kelley-Harness-Powershell-Weaponization-Made-Easy.pdf
Harness: Powershell ...
ListenLin Huang&Qing Yang - Low-cost GPS simulator – GPS spoofing by SDR from 2015-10-16T13:36:29
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Lin-Huang-Qing-Yang-GPS-Spoofing.pdf
Low-cost GPS simulator – GPS spoofing by S...
ListenSamy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars from 2015-10-16T13:16:39
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Samy-Kamkar-README.txt
Extras: https://media.defcon.org/DEF%20CON%2023/DEF%20CO...
ListenAlejandro Mayorkas - Working together to keep the Internet safe and secure from 2015-10-16T13:10:32
Working together to keep the Internet safe and secure
Alejandro Mayorkas Deputy Secretary of Homeland Security
We all have a role to play when it comes to ensuring the safety and s...
ListenEtienne Martineau - Inter-VM data exfiltration: The art of cache timing covert channel on x86 multi-core from 2015-10-16T13:09:14
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Etienne-Martineau-Inter-VM-Data-Exfiltration.pdf
Inter-VM data exfiltration: Th...
ListenYuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware from 2015-10-16T12:15:28
Attacking Hypervisors Using Firmware and Hardware
Yuriy Bulygin Advanced Threat Research, Intel Security
Mikhail Gorobets Advanced Threat Research, Intel Security
Alexander Mat...
Michael Robinson&Alan Mitchell - Knocking my neighbor’s kid’s cruddy drone offline from 2015-10-16T12:12:14
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Michael-Robinson-Knocking-My-Neighbors-Kids-Drone-Offline-UPDATED.pdf
Knocking ...
ListenBrian Gorenc, Abdul-Aziz Hariri, Jasiel Spelman - Abusing Adobe Reader’s JavaScript APIs from 2015-10-15T18:31:59
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Hariri-Spelman-Gorenc-Abusing-Adobe-Readers-JavaScript-APIs.pdf
Abusing Adobe R...
ListenGregory Picket - Staying Persistent in Software Defined Networks from 2015-10-15T18:30:39
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Gregory-Pickett-Staying-Persistant-in-Software-Defined-Networks.pdf
Extras Here...
ListenEric Van Albert&Zach Banks - Looping Surveillance Cameras through Live Editing of Network Streams from 2015-10-15T18:28:37
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Eric-Van-Albert-Zack-Banks-Looping-Surveillance-Cameras-like-in-the-Movies.pdf
...
ListenColby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service from 2015-10-15T18:27:17
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Colby-Moore-Spread-Spectrum-Satcom-Hacking.pdf
Spread Spectrum Satcom Hacking: ...
ListenDan “AltF4” Petro&Oscar Salaza - Hacking Smart Safes: On the "Brink" of a Robbery from 2015-10-15T18:23:12
Hacking Smart Safes: On the "Brink" of a Robbery
Dan “AltF4” Petro Security Associate, Bishop Fox
Oscar Salazar Senior Security Associate at Bishop Fox
Have you ever wanted to ...
Mickey Shkatov&Jesse Michael - Scared Poopless – LTE and your laptop from 2015-10-15T18:21:59
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Mickey-Shkatov-Jesse-Michael-Scared-poopless-LTE-and-your-laptop-UPDATED.pdf
Sc...
ListenDr. Phil Polstra - One Device to Pwn Them All from 2015-10-15T18:20:32
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phil-Polstra-One-device-to-Pwn-them-all.pdf
One Device to Pwn Them All
Dr....
Craig Young - How to Train Your RFID Hacking Tools from 2015-10-15T18:08:54
Materials Available Here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Craig-Young-How-To-Train-Your-RFID-Hacking-Tools-UPDATED.pdf
Whitepaper Here...
ListenAtlas - Fun with Symboliks from 2015-10-15T17:39:53
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Atlas-Fun-With-Symboliks.pdf
Fun with Symboliks
atlas dude at Grimm
Listen
Yuwei Zheng&Haoqi Shan - Build a free cellular traffic capture tool with a vxworks based femoto from 2015-10-15T17:30:11
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Yuwei-Zheng-Haoqi-Shan-Build-a-Free-Cellular-Traffic-Capture-Tool-with-a-VxWorks-Based-...
ListenNemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - 101 Track from 2015-10-15T17:08:45
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Lance-Buttars-Nemus-Hacking-SQL-Injection-for-Remote-Code-Execution-on-a-LAMP-UPDATED.pd...
ListenPaul Amicelli&David Baptiste - How to secure the keyboard chain from 2015-10-15T17:08:22
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Paul-Amicelli-David-Baptiste-How-to-secure-the-keyboard-chain.pdf
How to secu...
ListenPeter Desfigies, Joshua Brierton, Naveed Ul Islam - Guests N’ Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - 101 Track from 2015-10-15T17:08:10
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Desfigies-Brierton-Islam-Guests-N-Goblins.pdf
References:https://media.defcon.o...
ListenSaif El-Sherei&Etienne Stalmans - Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers - 101 Track from 2015-10-15T17:07:34
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Saif-El-Sherei-Etienne-Stalmans-SensePost-Introducing-Wadi-Fuzzer.pdf
Extending...
ListenSarah Edwards - Ubiquity Forensics - Your iCloud and You - 101 Track from 2015-10-15T17:07:08
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Sarah-Edwards-Ubiquity-Forensics.pdf
Ubiquity Forensics - Your iCloud and You <...
ListenTony Trummer&Tushar Dalvi - QARK: Android App Exploit and SCA Tool - 101 Track from 2015-10-15T17:06:46
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Tony-Trummer-Tushar-Dalvi-QARK.pdf
QARK: Android App Exploit and SCA Tool
Listen
Tony Trummer & Tushar Dalvi - QARK: Android App Exploit and SCA Tool - 101 Track from 2015-10-15T17:06:46
Materials Available Here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Tony-Trummer-Tushar-Dalvi-QARK.pdf
QARK: An...
Zack Allen&Rusty Bower - Malware in the Gaming Micro-economy from 2015-10-15T17:06:12
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Zack-Allen-Rusty-Bower-Malware-In-Gaming.pdf
Malware in the Gaming Micro-econom...
ListenYaniv Balmas&Lior Oppenheim - Key-Logger, Audio, Mouse — How To Turn Your KVM Into a Raging Key-logging Monster from 2015-10-15T17:05:56
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Yaniv-Balmas-Lior-Oppenheim-Key-Logger-Audio-Mouse.pdf
Key-Logger, Audio, Mouse...
ListenVivek Ramachandran - Chellam – A Wi-Fi IDS Firewall for Windows from 2015-10-15T16:59:09
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Vivek-Ramachadran-Chellam.pdf
Chellam – a Wi-Fi IDS/Firewall for Windows
...
Tamas Szakaly - Shall We Play a Game? from 2015-10-15T16:56:43
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Tamas-Szakaly-Shall-We-Play-A-Game-UPDATED.pdf
Shall We Play a Game?
Tama...
Mahdi Namazifar - Detecting Randomly Generated Strings; A Language Based Approach from 2015-10-15T15:19:45
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Mahdi-Namazifar-Detecting-Random-Strings-Language-Based-Approach.pdf
Detecting ...
ListenBruce Schneier - Questions and Answers from 2015-10-15T14:13:28
Bruce Schneier Q&A
Bruce Schneier CTO, Resilient Systems
Bruce Schneier Talks Security. Come hear about what's new, what's hot, and what's hype in security. NSA surveillance, airport...
Panel - DEF CON 101 The Panel from 2015-10-14T22:21:50
DEF CON 101: The Panel.
Mike Petruzzi (wiseacre), Senior Cyber Security Penetration Tester
Nikita Kronenberg Not a Security Researcher, DEF CON
PushPin
Plug
Russ Ro...
Ronny Bull&Jeanna Matthews - Exploring Layer 2 Network Security in Virtualized Environments from 2015-10-09T16:39:45
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ronny-Bull-Jeanna-Matthews-Exploring-Layer-2-Network-Security-In-Virtualized-Enviroment...
ListenCollin Cassidy, Robert Lee, Eireann Leverett - Switches Get Stitches from 2015-10-09T16:39:33
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Cassidy-Leverett-Lee-Switches-Get-Stitches.pdf
Switches Get Stitches
Coli...
Eric (XlogicX) Davisson - REvisiting RE:DoS from 2015-10-09T16:37:52
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Eric-XlogicX-Davisson-ReDoS.pdf
REvisiting RE:DoS
Eric (XlogicX) Davisson...
Alessandro Di Federico&Yan Shoshitaishvili - Dark side of the ELF - leveraging dynamic loading to pwn noobs from 2015-10-09T16:37:27
Materials Available Here:
https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Alessandro-Di-Federico-Leakless-How-The-ELF-ruined-Christmas.pdf
Dark si...
ListenChris Domas - REpsych: Psychological Warfare in Reverse Engineering from 2015-10-09T16:37:11
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Chris-Domas-REpsych.pdf
REpsych: Psychological Warfare in Reverse Engineering <...
ListenNadeem Douba - BurpKit - Using WebKit to Own the Web from 2015-10-09T16:36:39
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Nadeem-Douba-BurpKit.pdf
Extras here: https://media.defcon.org/DEF%20CON%2023/D...
ListenJoshua J. Drake - Stagefright: Scary Code in the Heart of Android from 2015-10-09T16:36:28
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Joshua-Drake-Stagefright-Scary-Code-in-the-Heart-of-Android-UPDATED.pdf
Stagefr...
ListenJoe FitzPatrick&Matt King - NSA Playset: JTAG Implants from 2015-10-09T16:36:14
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Joe-FitzPatrick-Matt-King-NSA-Playset-JTAG-Implants-UPDATED.pdf
Extras Here: ...
ListenMatteo Becarro&Matteo Collura - Extracting the Painful (blue)tooth from 2015-09-21T23:15:02
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Matteo-Becarro-Matteo-Collura-Extracting-The-Painful-Bluetooth.pdf
Extracting t...
ListenFernando Arnaboldi - Abusing XSLT for Practical Attacks - 101 Track from 2015-09-21T22:28:27
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Fernando-Arnaboldi-Abusing-XSLT-for-Practical-Attacks-UPDATED.pdf
Whitepaper Her...
ListenAmit Ashbel&Maty Siman - Game of Hacks: Play, Hack&Track - 101 Track from 2015-09-21T22:28:14
Materials Available Here: ;
https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Amit-Ashbel-Maty-Siman-Game-of-Hacks-Play-Hack-and-Track-UPDATED.pdf
Ga...
ListenBrent White - Hacking Web Apps - 101 Track from 2015-09-21T22:28:07
Whitepaper Here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Brent-White-Hacking-Web-Apps-WP.pdf
Hacking Web Apps
Brent White Security Consult...
Mark Ryan Talabis - The Bieber Project: Ad Tech 101, Fake Fans and Adventures in Buying Internet Traffic - 101 Track from 2015-09-21T22:27:40
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Mark-Ryan-Talabis-The-Bieber-Project.pdf
The Bieber Project: Ad Tech 101, Fake ...
ListenChris Sistrunk - NSM 101 for ICS - 101 Track from 2015-09-21T22:27:24
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Chris-Sistrunk-NSM-101-for-ICS.pdf
NSM 101 for ICS
Chris Sistrunk Sr. IC...
Mike Sconzo - I Am Packer And So Can You - 101 Track from 2015-09-21T22:27:18
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Mike-Sconzo-I-am-packer-and-so-can-you.pdf
I Am Packer And So Can You
Mik...
Michael Schrenk - Applied Intelligence: Using Information That's Not There - 101 Track from 2015-09-21T22:27:13
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Michael-Schrenk-Applied-Intelligence-UPDATED.pdf
Applied Intelligence: Using In...
ListenBruce Potter - A Hacker’s Guide to Risk - 101 Track from 2015-09-21T22:27:07
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Bruce-Potter-Hackers-Guide-to-Risk.pdf
A Hacker’s Guide to Risk
Bruce Pot...
John Menerick - Backdooring Git - 101 Track from 2015-09-21T22:26:51
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-John-Menerick-Backdooring-Git.pdf
Backdooring Git
John Menerick Security ...
Dennis Maldonado - Are We Really Safe? - Bypassing Access Control Systems - 101 Track from 2015-09-21T22:26:38
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Dennis-Maldonado-Are-we-really-safe-bypassing-access-control-systems-UPDATED.pdf
<... ListenLI Jun&YANG Qing - I’m A Newbie Yet I Can Hack ZigBee – Take Unauthorized Control Over ZigBee Devices - 101 Track from 2015-09-21T22:26:31
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Li-Jun-Yang-Qing-I-AM-A-NEWBIE-YET-I-CAN-HACK-ZIGBEE.pdf
I’m A Newbie Yet I Can...
ListenGerard Laygui - Forensic Artifacts From a Pass the Hash Attack - 101 Track from 2015-09-21T22:26:23
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Gerard-Laygui-Forensic-Artifacts-Pass-The-Hash-Attack.pdf
Forensic Artifacts Fr...
ListenIan Kline - LTE Recon and Tracking with RTLSDR - 101 Track from 2015-09-21T22:26:18
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ian-Kline-LTE-Recon-and-Tracking-with-RTLSDR.pdf
LTE Recon and Tracking with RT...
ListenEijah - Crypto for Hackers - 101 Track from 2015-09-21T22:26:11
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Eijah-Crypto-for-Hackers-UPDATED.pdf
Workshop Materials:https://media.defcon.or...
ListenDavid Huerta - Alice and Bob are Really Confused - 101 Track from 2015-09-21T22:26:05
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-David-Huerta-Alice-and-Bob-are-Really-Confused.pdf
Alice and Bob are Really Con...
ListenJason Haddix - How to Shot Web: Web and mobile hacking in 2015 - 101 Track from 2015-09-21T22:25:58
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Jason-Haddix-How-Do-I-shot-Web.pdf
How to Shot Web: Web and mobile hacking in 2...
ListenJustin Engler - Secure Messaging for Normal People - 101 Track from 2015-09-21T22:25:44
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Justin-Engler-Secure-Messaging-For-Normal-People.pdf
Whitepaper here: https://...
ListenGrant Bugher - It's The Only Way To Be Sure: Obtaining and Detecting Domain Persistence - 101 Track from 2015-09-21T22:24:53
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Grant-Bugher-Obtaining-and-Detecting-Domain-Persistence.pdf
It's The Only Way T...
Listen